Manual IP Rotation

Determining the identity of your operating system

Passive collection of configuration attributes from from your device (phone, server, proxy etc.) during network communications. This combination of parameters may then be used, by social media sites, to see your machine’s operating system (OS fingerprinting).

4G+ Mobile Proxies

Your Proxy must match the OS of a real Phone

TCP/IP stack

Just inspecting the Initial TTL and window size is enough in order to successfully identify an operating system.

TCP/IP Check

Your Fingerprint

Different operating systems, and different versions of the same OS, set different defaults values, and help build your online profile.

Profile Check

User agent ID

It will show your browser, version, plus some compatibility information. This is set by your software and not by the OS fingerprint. Set it correctly.

User Agent Check

Domain Name System (DNS)

DNS leaks are security flaws that allows DNS requests to be revealed , despite trying to conceal them. They must match the IP.

DNS Check

Time to live (TTL)

Or hop-limit, is a mechanism that limits the lifespan of data in a network and if not matched, will be suspicious to any platform.

TTL Check

Protection against fingerprinting

Disallowing TCP/IP fingerprinting provides protection from vulnerability scanners looking to target machines running a certain operating system, but will raise red flags with social media platforms.

More Information

∗ source: wikipedia.org

BrowserLeaks.com has basic features such as showing Your IP Address and HTTP Headers, IP-based geolocation (GeoIP) determines your Country, State, City, ISP/ASN, Local Time. There’s also TCP/IP OS Fingerprinting, WebRTC Leak Tests, DNS Leak Test, IPv6 Leak Test.

Some Examples are included below.

GET YOUR 4G+ MOBILE PROXY TRIAL

We offer 48-Hour Trials for Personal Use and 5-Day Trials for Agencies

Scroll to Top